Welcome to my Web Log. This Web Log mostly contains my thoughts
about Network Security, Network Analysis and Software Architecture.
The idea is that I'm abusing this space to reflect on the Project
Architectures when I happen to face some challenging problems.
Well, that - or when I'm in the mood to brag about some nice new
concepts or other things that I built with pride and prejudice.
If you have a request for a new article or feedback, you can use the
Contact Form
of the Portfolio or create an Issue in the repository manually
on GitHub
or GitLab.
There is also an RSS feed available. This is the subscription link
so you can copy/paste it in your RSS Reader of choice:
/weblog/feed.xml
Enjoy your stay.
Search. Recipe Creator.
This Search Recipe Creator allows to modify what kind of articles are visible below.
More selected ingredients means more articles are visible. Also, the cake is a lie.
Web Log.
Linux Assembly Part 2: Declaring Data
Learn Linux assembly to do declare data and reserve memory.
There's no need for LPM Trie data structures for network lookups, because you can use LPM hash sets. This article explains the origin of the concept, its implementation and why it's better.
Modding the GameBoy Advance to make it much more fun to play with, including retrosix case mod, backlit LCD display mod, USB-C mod, and EZFlash Omega for more convenient gameplay.
A How-To Guide on building a SOCKS version 4/5 client and server from scratch, explaining related RFCs and potential quirks and problems with other implementations.
A crash course in OSI layer theory, related bugs and exploits and what it means for the requirements of an Operating System and its software stack in order to improve anonymity in the face of god's eye like ISP overwatch scenarios.
A reflection about Identity, Privacy and common misconceptions about fingerprinting and what it means to be undetected inside a swarm of watched and infiltrated devices.
A How-To Guide on building a WebSocket version 13 client and server from scratch, explaining related RFCs and potential quirks and problems with other implementations.